Your Perfect Cybersecurity Partner

Stay Connected:



MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a tool that puts together commonly used mobile application reverse engineering and analysis tools, to assist in testing mobile applications against the OWASP mobile security threats. Its objective is to make this task easier and friendlier to mobile application developers and security professionals.


How to Install The Tool

Installation of Mara_Framework is a straightforward process. The tool can be installed by cloning the Github repository

   After downloading the tool. Install the setup file “”



MARA_Framework Usage Example


-s, --apk             - analyze apk file

-d, --dex             - analyze dex file

-j, --jar              - analyze jar file

-c, --class            - analyze class file

-m, --multiple-apk     - analyze multiple apk files

-x, --multiple-dex      - analyze multiple dex files

-r, --multiple-jar       - analyze multiple jar files

-h, --help            - print this help



apk file analysis e.g ./ -s                                                                                                                                             
dex file analysis e.g ./ -d                                                                                                                                             
jar file analysis e.g ./ -j                                                                                                                                             
class file analysis e.g ./ -c                                                                                                                                        
multiple apk analysis e.g ./ -m                                                                                                                                      
multiple dex analysis e.g ./ -x                                                                                                                                      
multiple jar analysis e.g ./ -r



You can view report in the (data/nameoftheapkfile/analysis/static/vulnerabilities/vulnerability_report.html) directory